{"title":"An Enhanced Encryption Scheme for IoT-Based Wireless Sensor Network Using DNA Enclosed Fully Homomorphic Approach","authors":"Alka Prasad Sawlikar, Devashri Shrikant Raich, Bireshwar Swapan Ganguly, Lowlesh Nandkishor Yadav","doi":"10.1002/ett.70075","DOIUrl":"https://doi.org/10.1002/ett.70075","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid proliferation of Internet of Things (IoT) devices has revolutionized wireless sensor networks (WSNs), enabling real-time monitoring across various applications. However, this growth introduces critical security challenges, including data breaches, time consumption, and memory overhead, which limit the efficiency and scalability of the existing encryption models. To address these issues, this paper proposes a novel DNA-enclosed Fully Homomorphic Encryption (HD-FHE) scheme integrated with improved elliptic curve cryptography (IECC). The proposed approach leverages dual-layer encryption by combining the strengths of deoxyribonucleic acid (DNA) computing and homomorphic encryption to secure data processing without decryption. The IECC further enhances key generation efficiency and reduces resource consumption. The experimental results demonstrate significant improvements in encryption (1.675 ms for 3 KB) and decryption (1.582 ms for 3 KB) times, alongside high throughput (2.275 ms for 7 KB), outperforming the existing models. These results highlight the robustness of the proposed method in minimizing vulnerabilities to Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA) while ensuring scalability in dynamic IoT environments. This work provides a significant contribution to IoT-based WSN security by achieving a balance between performance and protection, paving the way for secure and efficient data transmission in next-generation networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel Estimation for Reconfigurable Intelligent Surface-Assisted Cell-Free Communications","authors":"Chenfei Xie, Songjie Yang, Zhongpei Zhang","doi":"10.1002/ett.70096","DOIUrl":"https://doi.org/10.1002/ett.70096","url":null,"abstract":"<div>\u0000 \u0000 <p>Recent advancements in reconfigurable intelligent surface (RIS)-assisted cell-free systems have primarily focused on improving coverage and reducing network costs. However, much of the existing literature assumes perfect knowledge of channel state information (CSI), which poses significant challenges in practical implementations. This study investigates the channel estimation problem in RIS-assisted cell-free systems, highlighting two key observations: (1) a shared channel exists between the base station (BS) and the RIS across all users, and (2) a similar common channel exists between the RIS and the users across all BSs. Building on these insights, the paper addresses the challenges of cascaded and two-timescale channel estimation. Specifically, two novel methods are introduced: (1) a 3D-MMV-based compressive sensing technique for efficient cascaded channel estimation, and (2) a pilot reduction strategy that leverages multi-BS cooperation to enhance channel estimation performance. These methods aim to improve the accuracy and efficiency of channel estimation in RIS-assisted cell-free systems while minimizing pilot overhead.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayat M. Al-Rjoob, Ahmad A. Ababnah, Mamoun F. Al-Mistarihi
{"title":"Secure 5G Coordinating Spectrum Sharing System With Cooperation Transmitter and Receiver Pairs","authors":"Ayat M. Al-Rjoob, Ahmad A. Ababnah, Mamoun F. Al-Mistarihi","doi":"10.1002/ett.70080","DOIUrl":"https://doi.org/10.1002/ett.70080","url":null,"abstract":"<div>\u0000 \u0000 <p>In this paper, we propose a 6-node system consisting of two transmitter-receiver pairs sharing the same spectrum, an eavesdropper, and a relay, all operating in a half-duplex. The eavesdropper is mainly interested in communication between one of the transmitter-receiver pairs, which we call the primary. Communication along with the second pair called the secondary, is performed in two hops/time slots with the aid of the relay. The main idea of our study is to investigate the secrecy performance of the primary pair when jamming is performed by the secondary relay-assisted path. In particular, in the first time slot, the secondary destination acts as a jammer relative to the eavesdropper by injecting artificial noise known to the primary pair. During the second time slot, the secondary transmitter acts as a jammer while the relay forwards data to the secondary destination. In effect, this allows for cooperation among the nodes both in transmitting primary and secondary data while reducing the eavesdropper's ability to listen in on the primary link communication. For the proposed protocol, we derive closed-form expressions of the intercept probability. We also obtain a closed-form expression of the outage probability along with the secondary communication link. Moreover, we study the effect of transmit power allocation on intercept and outage probabilities along with the different links. Theoretical and simulation results are given to prove that the proposed protocol can provide better security for the primary link and acquire acceptable secondary outage probability.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-cluster Security Framework for Healthcare IoT: The Synergy of Redundant Byzantine Fault Tolerance with Extensions and Coati-Based Network","authors":"Rohit Beniwal, Vinod Kumar, Vishal Sharma","doi":"10.1002/ett.70098","DOIUrl":"https://doi.org/10.1002/ett.70098","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid integration of Internet of Things (IoT) devices into healthcare systems has revolutionized medical care delivery but has also introduced significant security challenges. Ensuring secure communication, privacy preservation, and system resilience in resource-constrained healthcare IoT networks is critical, given the sensitivity of the data involved and the potential for malicious attacks. This research addresses these concerns by proposing a Multi-cluster Security Framework for Healthcare IoT, designed to overcome existing limitations in security and scalability. The framework combines Redundant Byzantine Fault Tolerance with Extensions (RB-BFT X) and CoatiNet, leveraging lightweight cryptographic techniques, role-based access control, and dynamic routing algorithms. RB-BFT X enhances intra-cluster security through fault tolerance and anomaly detection, while CoatiNet optimizes inter-cluster communication using adaptive routing and self-recovery mechanisms inspired by coatis' natural behavior. Experimental results demonstrate the framework's efficacy, achieving a high detection rate of 98.20%, minimal latency, and stable throughput under various adversarial conditions. Compared to existing methods, it outperforms in maintaining network lifetime and reducing false positives, even with increased malicious activity. These findings have significant implications for enhancing the security and efficiency of healthcare IoT networks. The proposed methodology ensures robust data protection, efficient communication, and adaptability to evolving threats, contributing to safer and more reliable healthcare systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feasibility Analysis for Deployment of Free Space Optical Links in Urban Coastal Environments","authors":"Lakshmi Priya Isanaka, Meenakshi Murugappa","doi":"10.1002/ett.70097","DOIUrl":"https://doi.org/10.1002/ett.70097","url":null,"abstract":"<div>\u0000 \u0000 <p>Optical Wireless Communication (OWC) is a highly congruous communication system for the emerging Fifth Generation (5G) and Sixth Generation (6G) communication environments. The authors have discussed the efficacy of a terrestrial Free Space Optics (FSO) link in the coastal urban environments. Performance metrics such as received signal power and Link Margin (LM) are determined and hence used to judge the effectuation of the FSO model under consideration. Fog-Evoked Signal Degradation (FESD) is the indispensable contributor to atmospheric attenuation. Various models have been taken into account for the computation of FESD considering four consecutive months (November to February) for six consecutive years from 2018 to 2023. Mathematical analysis has been carried out from the real-time measured visibility data and wind speed values. Also, the altitude of the location has been considered for computing the scattering and Turbulence-Induced Attenuation (TIA). The LM is derived uniquely for summer and winter seasons to determine the feasibility for the establishment of the FSO link. For the purpose of the performance analysis, all three of the optical window wavelengths 850, 1300, and 1550 nm have been taken into account. Both the simulation results and mathematical estimates are used to compute the effective maximum achievable link range, link availability, and minimum visibility requirement for the specific geographic location under consideration.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eye Blinking Feature Processing Using Convolutional Generative Adversarial Network for Deep Fake Video Detection","authors":"Dipesh Ramulal Agrawal, Farha Haneef","doi":"10.1002/ett.70083","DOIUrl":"https://doi.org/10.1002/ett.70083","url":null,"abstract":"<div>\u0000 \u0000 <p>Deepfake video detection is one of the new technologies to detect Deepfakes from video or images. Deepfake videos are majorly used for illegal actions like spreading wrong information and videos online. Hence, deepfake video detection techniques are used to detect videos as real. Several deepfake detection methods have been introduced to detect Deepfakes from videos, but some techniques have limitations and low accuracy in predicting the video as real or fake. This paper introduces advanced deepfake detection techniques, such as converting the video into frames, pre-processing the frames, and using feature extraction and classification techniques. Pre-processing of frames using the sequential adaptive bilateral wiener filtering (SABiW) removes the noise from frames and detects the face using the 2D Haar discrete wavelet transform (2D-Haar). Then, the features are extracted from a pre-processed image with a depthwise separable residual network (DSRes). Finally, the video is classified using the Convolutional attention advanced generative adversarial network (Con-GAN) model as a deepfake video or original video. The Mud ring optimization algorithm is used to detect the weight coefficients of the network. Then, the overall performance of the proposed model is compared with other existing models to describe their superiority. The proposed method uses four datasets, which are FaceForensics++, Celeb DF v2, WildDeepfake, and DFDC. The performance of the proposed model provides a high accuracy rate of 98.91% and a precision of 98.32%. The proposed model provides better performance and efficient detection by detecting Deepfakes.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Approach for Spectral Efficiency Improvement in Massive MIMO Network Using Hybridized Optimization Assisted Optimal Pilot-Based Vector Perturbation Precoding","authors":"K. P. Keerthana, K. Kalirajan","doi":"10.1002/ett.70079","DOIUrl":"https://doi.org/10.1002/ett.70079","url":null,"abstract":"<div>\u0000 \u0000 <p>In multi-user Massive Multiple Input Multiple Output (MIMO) systems, acquiring Channel State Information (CSI) at the transmission point is crucial for accurate estimation, but it fails by costs and complexity. The Massive MIMO networks are known for the improved Spectral Efficiency (SE). These systems are equipped with antenna groups at the receiving end and the transmission point. Analyzing Channel State Information (CSI) from faulty channels is maximizing the precoder's complexity. The complexity of determining the optimal disrupting vector improves power transmission but reduces SE. This makes the optimization process more challenging. Therefore, in this work, an Optimal Pilot-Based Vector Perturbation Precoding (OPVP) is introduced to improve the SE of the massive MIMO system. The Hybrid Flamingo Search-based Sparrow Search Optimization Algorithm (HFS-SSOA) is used to optimally select the perturbing vector for efficient reception as well as transmission and is developed by combining the Flamingo Search Algorithm (FSA) and Sparrow Search Algorithm (SSA). In addition, the ideal pilot designs wisely intellects the CSI for providing response to the transmitter. Further, the compressive sensing will be used by OPVP for effectively selecting the low-dimensional CSI. The suggested approach effectively detects the low dimensional CSI by considering the objective functions like computational complexity, transmitting power, and computational overhead which is used to develop the perturbing signal within the constellation bound. Finally, the simulation process is carried out on the developed model to prove its effectiveness.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multiscale Principal Component Analysis Approach to Physical Layer Secret Key Generation in Indoor Environments","authors":"Megha Santhosh Kumar, Ramanathan Ramachandran","doi":"10.1002/ett.70100","DOIUrl":"https://doi.org/10.1002/ett.70100","url":null,"abstract":"<div>\u0000 \u0000 <p>With the rise of Industry 5.0, smart cities, and the ever-expanding use of general wireless networks, ensuring seamless communication and robust data security has become a critical challenge. Generating secure secret keys (SKG) through wireless channels is particularly complex in environments where noise and wideband conditions introduce discrepancies and autocorrelation in channel measurements. These issues compromise cross-correlation and randomness, leading to substantial bit disagreements, distinct keys at the transceivers, and unsuccessful SKG. This research begins by outlining the mathematical model of the signal preprocessing technique called multiscale principal component analysis (MSPCA). Subsequently, it explores the performance of key generation when employing the proposed scheme. A holistic system-level framework for creating initial shared keys is presented, encompassing quantization methods such as uniform multilevel quantization (UMQ) and encoding methods such as 3-bit Gray encoding. Monte Carlo-based simulations in an indoor scenario evaluate system efficacy using metrics like Pearson correlation coefficient, bit disagreement rate (BDR), randomness, and complexity. The proposed scheme achieves a BDR lower than 0.01, a correlation coefficient greater than 0.95, and passes all National Institute of Standards and Technology (NIST) randomness tests, establishing it as a viable solution for securing wireless systems. In the context of Industry 5.0 and smart city infrastructures, where seamless communication and robust data security are paramount, the proposed SKG framework offers significant potential. With its ability to ensure secure and reliable communication, this scheme can underpin the development of advanced wireless systems that cater to the high demands of interconnected ecosystems, enhancing resilience and trust in critical applications.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Transformative Impact of Blockchain Technology on Healthcare: Security, Challenges, Benefits, and Future Outlook","authors":"Anita Thakur, Virender Ranga, Ritu Agarwal","doi":"10.1002/ett.70087","DOIUrl":"https://doi.org/10.1002/ett.70087","url":null,"abstract":"<div>\u0000 \u0000 <p>This study aims to methodically explore the diverse applications of blockchain technology (BT) within the healthcare domain. Additionally, it seeks to analyze the inherent challenges of integrating BT into healthcare systems. Furthermore, this study elucidates blockchain's advantageous contributions to the healthcare domain. The suggested research thoroughly reviews the literature from various databases, using predetermined criteria, such as exclusion and inclusion, to identify pertinent studies. It also demonstrates the properties of blockchain and its functionality for the patient, healthcare providers, or overall healthcare infrastructure to assist the healthcare industry in a contemporary direction. The substantial advantages of BT within the medical field are notable. However, it is vital to acknowledge the security vulnerabilities by employing a blockchain-centered strategy to mitigate these challenges, allowing for the creation of a robust and streamlined system and framework. The importance of this study is that as this investigation navigates the convergence of healthcare and BT, it not only delineates the multifaceted applications of BT but also meticulously examines the associated security challenges. The findings of this study chart a course toward a technologically advanced, secure, and efficient healthcare ecosystem, improving patient outcomes and reshaping the future of healthcare delivery worldwide.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aravind Karrothu, G. V. Sriramakrishnan, V. Ragavi
{"title":"Gazelle-Dingo Optimization and Ensemble Classification: A Hybrid Approach for Intrusion Detection in Fog Computing","authors":"Aravind Karrothu, G. V. Sriramakrishnan, V. Ragavi","doi":"10.1002/ett.70084","DOIUrl":"https://doi.org/10.1002/ett.70084","url":null,"abstract":"<div>\u0000 \u0000 <p>Fog computing is a system that expands the cloud services to the network to manipulate the inherent issues of the cloud. An intrusion detection system (IDS) is a network security tool for monitoring a computer network for malicious activities that include potential threats, abnormal activities, and unauthorized access to fog networks. It is a key component of fog network security that provides quality of service in data communication. In this research, the intrusion is detected using the Ensemble classifier in the fog layer by utilizing the proposed gazelle dingo optimization (GDO). Here, three layers are considered for the entire process, including the endpoint layer, cloud layer, and fog layer. Initially, the physical process is done in the endpoint layer for connecting and exchanging the information. Then, at the cloud layer, various processes like data transformation, feature selection, and ensemble classification are carried out. The data transformation process utilizes Yeo-Johnson transformation, followed by feature selection that is done by Kulczynski similarity. Afterward, the selected features are fed toward ensemble classifiers such as deep residual network (DRN), deep belief network (DBN), and Zeiler-Fergus network (ZF-Net) for the classification, where the ensemble classifier is tuned by GDO. Finally, the fog layer detects the intrusion using an ensemble classifier tuned by GDO. The GDO is formed by combining the gazelle optimization algorithm (GOA) and dingo optimization algorithm (DOA). Here, the proposed GDO-Ensemble Classifier attained the superior values of precision, recall, and F-measure of 0.922, 0.935, and 0.918.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}